{"id":"CVE-2023-22495","summary":"Izanami is vulnerable to Authorization Bypass","details":"Izanami is a shared configuration service well-suited for micro-service architecture implementation. Attackers can bypass the authentication in this application when deployed using the official Docker image. Because a hard coded secret is used to sign the authentication token (JWT), an attacker could compromise another instance of Izanami. This issue has been patched in version 1.11.0.\n","aliases":["GHSA-9r7j-m337-792c"],"modified":"2026-04-24T12:09:11.816366Z","published":"2023-01-14T00:47:28.134Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/22xxx/CVE-2023-22495.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-288"]},"references":[{"type":"WEB","url":"https://github.com/MAIF/izanami/releases/tag/v1.11.0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/22xxx/CVE-2023-22495.json"},{"type":"ADVISORY","url":"https://github.com/MAIF/izanami/security/advisories/GHSA-9r7j-m337-792c"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22495"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/maif/izanami","events":[{"introduced":"0"},{"fixed":"511369b6ab2b568105a21a84d70deaf249e9ba69"}],"database_specific":{"source":["CPE_FIELD","REFERENCES"],"cpe":"cpe:2.3:a:maif:izanami:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"1.11.0"}]}}],"versions":["v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9","v1.1.0","v1.10.0","v1.10.1","v1.10.10","v1.10.11","v1.10.12","v1.10.13","v1.10.14","v1.10.15","v1.10.16","v1.10.17","v1.10.18","v1.10.19","v1.10.2","v1.10.20","v1.10.21","v1.10.3","v1.10.4","v1.10.5","v1.10.6","v1.10.7","v1.10.8","v1.10.9","v1.2.0","v1.3.0","v1.3.1","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.5.4","v1.6.0","v1.7.0","v1.7.1","v1.7.2","v1.8.0","v1.8.1","v1.8.2","v1.8.3","v1.8.3-BETA1","v1.8.3-BETA2","v1.8.3-BETA3","v1.8.3-BETA4","v1.8.3-BETA5","v1.8.4","v1.8.5","v1.9.0","v1.9.0-BETA1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22495.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}